Assignment 2 - Security Policies
Discussion Questions
- (DUE September 6, 2005 by midnight EDT) Briefly discuss what you learned from the readings in chapters 4:
- What was the most surprising thing you learned?
- What was the most difficult part for you?
- (DUE September 6, 2005 by midnight EDT) Select one of the following questions to discuss in detail through the threaded discussion.
- A noted computer security expert has said that without integrity, no system can provide confidentiality.
- Do you agree? Justify your answer.
- Can a system provide integrity without confidentiality? Again, justify your answer.
- A cryptographer once claimed that security mechanisms other than cryptography were unnecessary because cryptography could provide any desired level of confidentiality and integrity. Ignoring availability, either justify or refute the cryptographer's claim.
- Consider the UC Davis policy on reading electronic mail. A research group wants to obtain raw data from a network that carries all network traffic to the Department of Political Science.
- Discuss the impact of the electronic mail polciy on the collection of such data.
- How would you change the policy to allow the collection of this data without abandoning the principle that electronic mail should be protected?
- (DUE September 11, 2005 by midnight EDT) Select a discussion from one or more of your classmates and respond to their comments.
Click here to return to Wayne's World's homepage:
written by Wayne Summers summers_wayne@ColumbusState.edu